The distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.
Abstract- Asymptomatic or clinically silent kidney stones are possibly serious because, in their expected passage, they may cause infection, obstruction and renal impairment. The purpose of this study was to determine the prevalence of silent kidney stones in a sample of Baghdad population and consider how this value could affect the justification for a screening system. To our best knowledge, this is the first study of its kind conducted in Iraq. We investigated 714 consecutive patients who sustained an abdominal ultrasound at our hospital with further kidney screening. All these patients did not have clinical signs and symptoms of nephrolithiasis. Age, sex, the indication for ultrasound, the size, side, and the number of the disco
... Show MoreAbstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show MoreThe Red Palm Weevil (RPW), Rhynchophorus ferrugineus (Olivier, 1790) is a devastating invasive pest of palm trees, invading the Iraqi date palm tree in 2015 for the first time in Safwan county, Basrah province. The Red Palm weevil has been categorized as a quarantine pest of date palm trees worldwide. In this study, a five years monitoring program has been achieved by scouting the invasive pest RPW population in Safwan county by using visual sampling and Pheromone baited traps.
The results indicated that the number of infested palms, increased from 12 trees in 2015 to 111 in 16 orchards in 2016. The number of the infested palms was minimized to 3 trees in the county in 2019 due to the management protocol of the Ministry of Agriculture
The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreBackground: Esthetic treatment is the options of patient seeking orthodontic treatment. Therefore this study was conducted to measure the concentration of Aluminum, Nickel, Chromium and Iron ions released from combination of monocrysralline brackets with different arch wires immersed in artificial saliva at different duration, to evaluate the corrosion point on different parts of the orthodontic appliances before and after immersion in artificial saliva, and to evaluate the corrosion potential of each group of the orthodontic appliances. Material and methods: Eighty orthodontic sets prepared. Each set represents half fixed orthodontic appliance, from the central incisor to the first molar, for the maxillary arch, each set consisted of molar
... Show Morebased search on two variables two main (Administrative empowerment ) and (technical innovation) target detection relationship and influence between the five dimensions (the delegation of authority , personnel training , effective communication, work teams , motivating employees) and
(technical innovation) conducted research in General Company for electrical Industries , and through the sample included the views of managers in the various administrative levels poll .
And adopted a researcher at a major tool for data collection is questionnaire designed to find, as was the contents of the questionnaire analysis according to the Statistical Information System ( Spss), The (55) to identi
... Show MoreAcidizing is one of the most used stimulation techniques in the petroleum industry. Several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly in the development of the Mishrif reservoir, including the following: (1) high injection pressures make it difficult to inject acid into the reservoir formation, and (2) only a few acid jobs have been effective in Ahdeb oil wells, while the bulk of the others has been unsuccessful. The significant failure rate of oil well stimulation in this deposit necessitates more investigations. Thus, we carried out this experimental study to systematically investigate the influence of acid treatment on the geomechanical properties of Mi4
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreGuanine has a variety of roles in chemistry, from its basic function in the storing and transferring genetic information to its usages in synthetic chemistry and other fields. Because of its distinct structure and biological importance, it is a fundamental component of contemporary study in organic chemistry and molecular biology. In this review, we focused on covering the synthetic pathways of various derivatives of guanine from the year 2000 until the present. As a result of the guanine molecule containing multiple functional groups, this gives us the ability to prepare several guanines such as O6-alkylating guanines, O6-benzylguanines, 8-aza-O6-benzylguanines, 9-substituted guanines, guanine-azo derivatives, guanine Schiff bases, guanin
... Show More